Enhancing Email Security Against Phishing Attacks Through User Behavior Analysis and Data Loss Prevention (DLP)
DOI:
10.29303/jppipa.v11i4.10781Published:
2025-04-25Issue:
Vol. 11 No. 4 (2025): AprilKeywords:
Attacks, Data Loss Prevention (DLP), Email, Phishing, Security, User behaviorResearch Articles
Downloads
How to Cite
Downloads
Metrics
Abstract
This study was conducted and aimed to improve email security against phishing attacks through user behavior analysis and data loss prevention (DLP). Phishing attacks pose a significant threat to the protection of user information and privacy, especially for individuals who are less aware of phishing emails. Their vulnerability to such attacks not only compromises their own security but also poses a great risk to the company. This can result in huge financial losses. Thus, there is an urgent need to improve security measures for users and systems. This study will use the NIST Cybersecurity Framework 2.0. This framework provides a structured approach to identifying and analyzing user behavior. Then an assessment of the phishing simulation is carried out to pay attention to users who are vulnerable to phishing attacks. After assessing the phishing email, the DLP configuration is determined for preventive measures. The following are the core functions of CSF as a framework that will be used: Based on the phishing simulation conducted, the pattern is almost the same, displaying the sender's email domain that is very similar to the original. Employees are usually easily trapped if they do not read the domain carefully and immediately follow the instructions in the email body. Phishing emails typically have a business context and are assumed to be sent by a trusted person, such as a supervisor, a colleague from the same department, or a different department. User behavior analysis is key to identifying vulnerabilities to phishing attacks. Understanding how users interact with emails can help develop effective mitigation strategies. Implementing DLP as a layer of defense can proactively detect and prevent phishing emails from reaching users’ inboxes. Proper DLP configuration is critical to a successful implementation. User education and training are critical components to raising awareness of phishing threats. Equipping users with the skills to recognize and avoid phishing attacks can significantly reduce an organization’s vulnerability.
References
Abid, N. (2020). Advancements and Best Practices in Data Loss Prevention: A Comprehensive Review. Global Journal of Universal Studies, 1(1), 190–225. Retrieved from https://media.neliti.com/media/publications/590136-advancements-and-best-practices-in-data-a5521663.pdf
Adeyeri, A., & Abroshan, H. (2024). Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era. Information, 15(11), 682. https://doi.org/10.3390/info15110682
Ahmed, M. N., Mahmood, H., & Iqbal, Z. (2023). A Novel Framework for Email’s Data Leak Prevention Through Semantic Analysis. 2023 International Conference on It and Industrial Technologies (ICIT), 1–6. https://doi.org/10.1109/icit59216.2023.10335896
Alsharnouby, M., Alaca, F., & Chiasson, S. (2015). Why Phishing Still Works: User Strategies for Combating Phishing Attacks. International Journal of Human Computer Studies, 82, 69-82. https://doi.org/10.1016/j.ijhcs.2015.05.005
Aziz, F., Mayasari, N., Sabhan, S., Zulkifli, Z., & Yasin, M. F. (2022). The Future of Human Rights in the Digital Age: Indonesian Perspectives and Challenges. Journal of Digital Law and Policy, 2(1), 29–40. https://doi.org/10.58982/jdlp.v2i1.292
Beyer, J. L. (2023). The Politics of Cybersecurity and the Global Internet. Perspectives on Politics, 21(2), 664–668. https://doi.org/10.1017/s1537592723000361
Chaganti, R., Varadarajan, V., Gorantla, V. S., Gadekallu, T. R., & Ravi, V. (2022). Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture. Future Internet, 14(9), 1–20. https://doi.org/10.3390/fi14090250
Dawkins, S., & Jacobs, J. (2023). NIST Phish Scale User Guide. Gaithersburg: National Institute of Standards and Technology. https://doi.org/10.6028/NIST.TN.2276
Domnik, J., & Holland, A. (2024). On Data Leakage Prevention Maturity: Adapting The C2m2 Framework. Journal of Cybersecurity and Privacy, 4(2), 167–195. https://doi.org/10.3390/jcp4020009
Emenike, S. U. (2021). Data Loss Prevention in A Remote Work Environment. Retrieved from https://urn.kb.se/resolve?urn=urn%3anbn%3ase%3ahis%3adiva-20203
Firdaus, G. A., Sukowati, P., & Adi, D. S. (2023). Licensing of MSME Business Through Online Single Submission Risk Based Approach. Cross Current International Journal of Economics, Management and Media Studies, 5(02), 11–20. https://doi.org/10.36344/ccijemms.2023.v05i02.001
Hassib, B., & Shires, J. (2024). Digital Recognition: Cybersecurity and Internet Infrastructure in UAE–Israel Diplomacy. International Affairs, 100(6), 2399–2418. https://doi.org/10.1093/ia/iiae233
Montano, I. H., Diaz, J. R., Aranda, J. J. G., Molina-Cardín, S., López, J. J. G., & Díez, I. D. L. T. (2024). Securecipher: An Instantaneous Synchronization Stream Encryption System for Insider Threat Data Leakage Protection. Expert Systems with Applications, 254, 124470. https://doi.org/10.1016/j.eswa.2024.124470
Isaura, E. R., Chen, Y.-C., Su, H.-Y., & Yang, S.-H. (2020). The Relationship between Food Security Status and Sleep Disturbance Among Adults: A Cross-Sectional Study in An Indonesian Population. Nutrients, 12(11), 3411. https://doi.org/10.3390/nu12113411
ISO/IEC. (2018). ISO/IEC 27005: 2018 Information Security Risk Management-Guidelines. 2018. Retrieved from https://www.iso.org/standard/75281.html
Jaeger, L., Eckhardt, A., & Kroenung, J. (2021). The Role of Deterrability for the Effect of Multi-Level Sanctions on Information Security Policy Compliance: Results of a Multigroup Analysis. Information & Management, 58(3), 103318. https://doi.org/10.1177/14624745211068870
Kapoor, M. (2024). Comparative Analysis of AI Algorithms for Enhancing Phishing Detection in Real-Time Email Security. Aitoz Multidisciplinary Review, 3(1), 338–352.
Khan, A. W., Saeed, S., & Kakar, M. S. (2024). Cybersecurity as a Geopolitical Tool: The Growing Influence of Digital Warfare in Statecraft. International Research Journal of Social Sciences and Humanities, 3(2), 345–357. Retrieved from https://irjssh.com/index.php/irjssh/article/view/209
Khanna, A. (2024). Ransomware Prevention. In Securing An Enterprise (Bll 119–138). Apress. https://doi.org/10.1007/979-8-8688-1029-9_7
Kintonova, A., Vasyaev, A., & Shestak, V. (2021). Cyberbullying and Cyber-Mobbing in Developing Countries. Information & Computer Security, 29(3), 435–456. https://doi.org/10.1108/ics-02-2020-0031
Kovaitė, K., Šūmakaris, P., & Stankevičienė, J. (2020). Digital Communication Channels in Industry 4.0 Implementation. Management, 25(1), 171–191. https://doi.org/10.30924/mjcmi.25.1.10
Kulkarni, S., & Girish, G. N. (2024). Navigating The Abyss–Illuminating Data Leakage Threats, Mitigations, and Future Horizons. In Cloud Security (Bll 37–51). Chapman And Hall/Crc.
Leo, M., Sharma, S., & Maddulety, K. (2019). Machine Learning in Banking Risk Management: A Literature Review. Risks, 7(1), 29. https://doi.org/10.3390/risks7010029
Li, H., Ge, D., Liu, S., Zhang, W., Wang, J., Si, J., & Zhai, J. (2019). Baduanjin Exercise for Low Back Pain: A Systematic Review and Meta-Analysis. In Complementary Therapies In Medicine. https://doi.org/10.1016/j.ctim.2019.01.021
Liesnaia, Y., & Malakhov, S. (2023). The Analysis of Development, Typical Objectives and Mechanisms of Phishing Attacks. Computer Science and Cybersecurity, 1, 6–27. https://doi.org/10.26565/2519-2310-2023-1-01
Liu, S., & Kuhn, R. (2010). Data Loss Prevention. It Professional, 12(2), 10–13. https://doi.org/10.1109/mitp.2010.52
Mansikka, J. (2023). Data Loss Prevention: For Securing Enterprise Data Integrity. Retrieved from https://urn.fi/urn:nbn:fi:amk-2023101827711
Marcillo-Delgado, J. C., Alvarez-Garcia, A., & García-Carrillo, A. (2022). Communication Strategies on Risk and Disaster Management in South American Countries. International Journal of Disaster Risk Reduction, 76, 102982. https://doi.org/10.1016/j.ijdrr.2022.102982
Marques, L. (2024). Enhancing Data Breach Prevention Measures in Corporate Setting. Retrieved form https://repository.stcloudstate.edu/msia_etds/144
Moore, J. (2024). Keeping up with the NIST CyberSecurity Framework. Retrieved from https://medium.com/@jefferywmoore/keeping-up-with-the-nist-cybersecurity-framework-3ff9fd983cc9
Nayak, A., Patnaik, A., Satpathy, I., & Patnaik, B. C. M. (2024). Data Storage and Transmission Security in the Cloud. Indian Journal of Cryptography and Network Security, 2(2), 194–212. https://doi.org/10.4018/979-8-3693-1431-9.ch009
Omodara, H. (2022). Cloud Security: A Survey of Information Communication Technology (ICT) and Cybersecurity Professionals’ Perception on Data Loss Prevention (DLP) Measures for Software-as-a-Service (SaaS) Application-Related Data Breaches and Leakage. Retrieved from https://www.academia.edu/88587761/Cloud_Security_A_survey_of_Information_Communication_Technology_ICT_and_Cybersecurity
Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of Cybersecurity, 2023, 115–133. http://dx.doi.org/10.58496/MJCSC/2023/016
Prince, N. U., Faheem, M. A., Khan, O. U., Hossain, K., Alkhayyat, A., Hamdache, A., & Elmouki, I. (2024). AI-Powered Data-Driven Cybersecurity Techniques: Boosting Threat Identification and Reaction. Nanotechnology Perceptions, 20, 332–353.
Saunders, A., Cornett, M. M., & Erhemjamts, O. (2021). Financial Institutions Management: A Risk Management Approach. Mcgraw-Hill.
Senapati, K. K., Kumar, A., & Sinha, K. (2023). Impact of Information Leakage and Conserving Digital Privacy. In Malware Analysis and Intrusion Detection in Cyber-Physical Systems (Bll 166–188). Igi Global. https://doi.org/10.4018/978-1-6684-8666-5.ch008
Shahbaznezhad, H., Kolini, F., & Rashidirad, M. (2021). Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter? Journal of Computer Information Systems, 61(6), 539–550. https://doi.org/10.1080/08874417.2020.1812134
Shishodia, B. S., & Nene, M. J. (2022). Data Leakage Prevention System for Internal Security. 2022 International Conference on Futuristic Technologies (INCOFT), 1–6. https://doi.org/10.1109/incoft55651.2022.10094509
Steves, M., Greene, K., & Theofanos, M. (2020). Categorizing Human Phishing Difficulty: A Phish Scale. Journal of Cybersecurity, 6(1), 1–16. https://doi.org/10.1093/cybsec/tyaa009
Syarova, S., Toleva-Stoimenova, S., Kirkov, A., Petkov, S., & Traykov, K. (2024). Data Leakage Prevention and Detection in Digital Configurations: А Survey. Environment, Technologies, Resources, Proceedings of The International Scientific and Practical Conference, 2, 253–258. https://doi.org/10.17770/etr2024vol2.8045
Vashishth, T. K., Sharma, V., Sharma, K. K., Kumar, B., Chaudhary, S., & Panwar, R. (2024). Enhancing Cloud Security. In Improving Security, Privacy, and Trust in Cloud Computing (Bll 85–112). Igi Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-1431-9.ch004
Wang, C., Cheng, Z., Yue, X.-G., & Mcaleer, M. (2020). Risk Management of Covid-19 by Universities in China. Journal of Risk and Financial Management, 13(2), 36. https://doi.org/10.3390/jrfm13020036
Wendy, W. (2024). The Nexus between Financial Literacy, Risk Perception and Investment Decisions: Evidence from Indonesian Investors. Investment Management & Financial Innovations, 21(3), 135-147. http://dx.doi.org/10.21511/imfi.21(3).2024.12
Wiranata, G. A., Ucuk, Y., Subekti, S., & Sidarta, D. D. (2024). Pertanggungjawaban Pidana Terhadap Pelaku Tindak Pidana Phishing. Court Review: Jurnal Penelitian Hukum (E-Issn: 2776-1916), 4(02), 13–25. https://doi.org/10.69957/cr.v4i02.1503
Yadav, I., & Gupta, H. (2023). Designing Data Loss Prevention System for the Enhancement of Data Integrity in Cyberspace. 2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 1361–1365. https://doi.org/10.1109/ICAC3N60023.2023.10541823
Author Biographies
Tamara Sinatrya Yasmin, Swiss German University
Tomi Yulianto, Swiss German University
License
Copyright (c) 2025 Tamara Sinatrya Yasmin, Tomi Yulianto

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with Jurnal Penelitian Pendidikan IPA, agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution 4.0 International License (CC-BY License). This license allows authors to use all articles, data sets, graphics, and appendices in data mining applications, search engines, web sites, blogs, and other platforms by providing an appropriate reference. The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in Jurnal Penelitian Pendidikan IPA.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).